Get new jobs by email
- ...effectiveness. Develops and maintains test procedures and plans for IT Security Controls, ensuring alignment with key objectives, industry... ...reasonable accommodation during the application process. All information shared during the accommodation request process will be stored...
- ...businesses and consumers to gather analyze and deliver critical information needed to build strong economies around the world. Protection... ...is critical our customers and business. As an Information Security Consultant you will be responsible for facilitating our Information...
- ...big dream: To forever change how diabetes is managed. To unlock information and insights that drive better health outcomes. Here we are 25... ...stands before us. Meet The Team The Dexcom Information Security organization protects Dexcom's patients, employees, and data...
- ...Job Title: Information Security Specialist (Compliance & Audit Focus) Job Summary We are seeking a detail-oriented Information Security Specialist to support compliance initiatives and certification audit projects. This role is primarily focused on Information...
- ...Head of Cloud, Infrastructure & IT Security Key Responsibilities Cloud & Infrastructure Leadership Own the overall cloud strategy... ...Qualifications ~ Bachelor's degree in Computer Science, Information Technology, or related field (Master's preferred). ~8–10+...
- Job Summary We are seeking a Data Security Engineer to lead our data protection and data loss prevention (DLP) efforts. This role focuses... ...and operate Microsoft Purview DLP, data labeling, and information protection policies, or equivalent platforms. Define and enforce...
- ...Information Security Analyst (Sales Enablement Focus) Schedule: MondayFriday 9:00 AM5:00 PM Eastern Time Apply here: Overview Were looking for a detail-oriented Security & Compliance Analyst to own and manage customer security questionnaires RFPs and...
- ...Under the guidance of the Senior Analyst you will execute cyber security risk strategies support supplier assessments contribute to risk... ...industry trends threat developments and benchmarking to inform best practices. Support Third-Party Risk Management (TPRM) teams...
- ...development in the Asia-Pacific region. Organizational Setting and Reporting Relationship The position of IT Specialist (Information Security) is assigned to the Cybersecurity & Compliance Unit within the Information Technology Department (ITD). You will be based at...
- ...landscape of tomorrow. Summary of This Role Evaluates tests recommends develops coordinates monitors and maintains information security policies procedures and systems including hardware firmware and software . Ensures that IS security architecture/designs plans...
- ...restructures it into clear, job-focused sections without adding new facts. Note on Security Don\'t be fooled by criminals making false employment offers, requesting personal and financial information, or impersonating Tyler management. In our recruiting practice, we do not …...
- ...Job Description - Information Security Tools Engineer (049AG) Information Security Tools Engineer Your potential has a place here with TTEC’s award‑winning employment experience. As an Information Security Tools Engineer working remotely in Metro Manila Philippines...
- ...usability Participate in process improvement projects aimed at enhancing team efficiency Collaborate with team members to gather information for documenting workflows and solutions Help respond to basic end-user requests via email, phone, or chat Guide users on...
- ...The Manager Information Risk Management is responsible for supporting the directors within the team in the delivery of the 2nd Line... ...the foundation to become a Subject Matter Expert on information security technology risk and business continuity and disaster recovery...
- ...and Reporting Relationship The position of Audit Specialist (Information Systems) is assigned within the Office of the Auditor General... ..., vulnerability management, systems development, information security, database management and project management. Project management...
- ...epidemic control and one focused on strengthening global health security (GHS). The role outlined in this job description supports EpiC'... ...sub-activities under each technical area are aligned with and informed by national priorities and strategies, including the National Action...
- ...a global business services organization. Established in 1998, CHI provides business support services in finance and accounting, information technology, supply chain management, human resources, customer service and marketing. It serves Chevron affiliates around the world...
- Senior IT Audit Manager - SOX Manila | Corporate audit and risk Our client is building a high performing SOX delivery team in Manila and needs an experienced senior manager to lead IT SOX testing across a global business. The role You will own end to end...
- ...Apply security skills to design, build and protect enterprise systems, applications, data, assets, and people. Provide services to safeguard information, infrastructures, applications, and business processes against cyber threats. Summary: As a Security Engineer, you...
- ...Zone IT Solutions is seeking an experienced Security Consultant. In this role, you will provide expert advice and guidance on a range... ...Requirements: Bachelor's degree in Cyber Security, Information Technology, or a related field, Proven experience as a Security...
- ...best practices to continuously enhance the vulnerability management program Requirements Bachelor's degree in information technology, cyber security, or a related field. Prior experience in vulnerability management, programming, or a related technical role is...
- About the Job Our client is a lean digital marketing agency focused on SEO, PPC, and WordPress support. We're hiring a Project Manager/Operations Lead to keep client delivery organized, on-track, and moving forward. This role owns day-to-day project operations across...
- Information Security Governance & Operations Our Mission Our goal is for everyone to make bolder choices with their finances. To get there, we're creating an all-in-one ecosystem of financial services for today's generation of goal-getters. That feat takes extraordinary...
775000 $ per day
...should possess a strong foundation in Cloud computing, cloud security principles, and cloud identity management, with a specific emphasis... ..., sexual orientation, gender identity or expression, genetic information, marital status, citizenship status or any other basis as...- ...Leads the implementation and delivery of Security Services projects, leveraging our global delivery capability (method, tools, training... ...Skills: - Required Skill: Expert proficiency in Security Information & Event Management (SIEM) Platform Operations. - Strong understanding...
- ...Good Security Management skills Experience in managing safety and security of work place Experience in monitoring and maintaining... ...phase environment Good communication skills Additional Information : Employee benefit card offering discounted rates in...
- ...What Information Security and Risk contributes to Cardinal Health Information Technology oversees the effective development delivery and operation of computing and information services. This function anticipates plans and delivers Information Technology solutions and...
- ...Philippines. What You'll Do Assist in the maintenance of our security infrastructure and 3rd Party services. Works with different... ...required by stakeholders. Assist in the creation of information security operations documentation. Auditing of access privileges...
- ...Europe #1 bug bounty platform, with offices in Paris, Singapore, Switzerland, Germany. We provide a disruptive approach to Cyber Security through Bug Bounty programs, by connecting more than 100,000+ Ethical Hackers worldwide with organisations to secure their exposed...
- ...Deliver and manage security services across client environments to ensure protection, compliance, and operational resilience. Summary... ...coding practices and application vulnerabilities. Additional Information: - The candidate should have minimum 2 years of experience in...
